What if you had a "virtual doctor" who was available at any time-24
This post was written by Dr. Stanley Ndwiga, Outreach/Project Doctor at Gertrude's Children's Hospital in Nairobi, Kenya. It was originally published on the Huffington Post. Ten years ago, an AIDS epidemic was ravaging Kenya and o...
You've all heard the saying "think outside the box" when encouraging someone to be creative and come up with new ideas, new ways to do things, new ways to.....just about anything. Well, I'd like to take a small twist on the ...
Dreamhack Winter 2013 in the small city of Jonkoping in central Sweden claims to be the world's largest digital event. I was skeptical at first, but when I arrived for the event, I was completely amazed at the scale of things in t...
It's hard to believe that over eight years have passed since I started working with Cisco. Along the way, I learned so much from peers, the industry, and about myself. As I get ready to pursue a new adventure outside of Cisco, I w...
This post is from guest blogger Emily Kraft, Food & Nutrition Services Outreach Coordinator for the Food Bank of Central & Eastern North Carolina, one of the hunger relief organizations Cisco employees support through the ...
Cisco's cloud software is a hot topic. First Cisco UCS Director was voted the SVC award winner for best virtualization management software. Then Forrester released a new Private Cloud Wave and both Cisco Intelligent Au...
Security intelligence, threat intelligence, cyber threat intelligence, or "intel" for short is a popular topic these days in the Infosec world. It seems everyone has a feed of "bad" IP addresses and hostnames they want to sell you...
To read the first part of the Network Matters blog series that discusses how an architectural approach to mobility is essential for the Future of Mobility,click here.To read the second part of the series that focuses on how IT lea...
Every year in Scottsdale, Arizona, there's a unique Information Security conference created by Joyce Brocaglia at ALTA, supported by a who's who of InfoSec companies like Cisco, RSA, and Symantec, and attended by hundreds of some ...
With several key applications moving to theclouds, how do our customers ensure application performance? What if they deploy for instance Public or Private Hosted solutions orhybrid WAN, how do they ensure application experience? T...
Proxy auto-config or PAC files are commonly used by IT departments to update browser settings so that internet traffic passes through the corporate web gateway. The ability to redirect web traffic to malicious proxy servers is par...